SolarWind’s Data Breach – Update
Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale.
What’s on the shelf:
- Microsoft Information (Partial Source Code) for $ 600k
- Cisco Information (source code for some products) for $ 500k
- SolarWinds information (source code of the entire product) for $ 200k.
- FireEye Information (Red Team Assault Tool) for $ 50k.
Oh, and there is a sale … a package of all the above information for a million dollars.
WIIFM (What’s in it for me)
Beware: the next wave of ransomware and malware will not be recognized by antivirus which means that if you install it, the hackers will have 6 to 9 months of data
WSID2P (What should I do to protect)
Be aware. They are coming for you, and they’ll use any trick in the book for it.
Get informed and Start to protect your company now.
( Source: http://solarleaks.net/)
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The Subtle Snail Recruitment Trap – How Attackers Use Fake HR to Steal Credentials and Persist
🚨 Recruitment-Style Phishing Is the New Front Line
😱 Researchers link an Iran-nexus group to recruitment lures that infected 34 devices across 11 organizations, using fake HR profiles to bait targets.
🧩 The bait looks real: tailored outreach, plausible interviews, and job documents that contain weaponized ZIPs or signed binaries which deploy loaders.
🧠 The payload family MINIBIKE steals credentials, logs keystrokes, and creates persistent backdoors for long-term espionage.
⚠️ These campaigns hide traffic in Azure-hosted C2 and abuse DLL sideloading to evade detection, so standard AV often misses them.
✅ Quick actions: treat unsolicited job attachments as untrusted; verify recruiter emails and LinkedIn profiles; sandbox any job-related archive before opening.
🔁 For security teams – simulate recruitment lures, tighten endpoint rules against DLL sideloading, and monitor cloud egress for anomalous C2.
🔎 SEO note: use keywords like job, recruiter, LinkedIn, credential theft, MINIBIKE to surface this threat to practitioners and hiring teams.
🔒 AUMINT.io helps design simulations and detection playbooks that mirror this recruitment workflow. Book a 15-minute intro and get a tailored risk checklist: https://calendly.com/aumint/aumint-intro
#JobSeekers #CISO #HR #ITSecurity #AUMINT #ThreatIntel #RecruitingSecurity